O LEVEL- IT TOOLS & BUSINESS SYSTEM

TRICKS TO CRACK FIRST PAPER:   

                            M1-R4: IT TOOLS & BUSINESS SYSTEMS

     

        SOME IMPORTANT TOPICS WHICH FREQUENTLY ASKED EVERY            YEAR:--

                  

Difference between  follwings---

SPAM , VIRUS , MALWARE,  INTERPRETER,  COMPILER , IMPACT ,NON IMPACT PRINTER , RAM , ROM ,DDL , DML ,SYSTEM SOFWARE , APPLICATION SOFTWARE , PRIMARY KEY , FOREIGN KEY ,MICR , OCR , MULTROCESSING , MULTIPROGRAMMING , CACHE AND REGISTER MEMORY TEMPLATE AND WIZARD----

SPAM
Also known as unsolicited bulk e-mail messages or any email messages irrespective of content that is unwanted or unrequested by the recipient. Spam messages are mostly commercial advertising, although chain letters, political mailings and other forms of non-commercial mailings are often included under the same categorization. A large portion of spam has also been found to be comprised of ads for products of dubious quality and services of questionable legality.

There are two types of spam: intentional and unintentional.

Intentional spam comes from spammers who are soliciting products or attempting to commit fraud.
Unintentional spam originates from computers that are infected with a virus or worm that activates e-mail distribution processes in the background. The virus or worm attempts to send bulk messages from the infected computer without the awareness of the computer owner.



                   VIRUS
   MALWARE          
   Definition
A virus is a program code that attaches itself to a program or file and infects other computers through that file.
Malware is short for malicious software.
These are programs used to disrupt
computer  operations, gather sensitive
data or gain access to private systems.
  Controlled remotely
No
Depends on the type of Malware.
  Types
Resident viruses and non-resident viruses.
Computer viruses, Ransomware, Worms,
Trojan horses, Rootkits, Keyloggers,
Dialers, Spyware, Adware, Malicious
 BHOs, Rogue security software
  Process of infection
Attaches itself to an executable file, folder or program.
Can spread automatically or requires
 user  intervention, depending on the
 type  of malware.
  Process of spreading
Viruses rely on transfer of files or other programs in order to spread to other systems.
Spread using executable software of
through transference of files and folders.
  Infecting files
Yes, it modifies, alters or deletes certain files.
Can modify, alter or delete data. Can
 collect information and pass on other
 locations.
  Speed of spreading
Slower compared to worms.
Speed depends on the type of malware.
 Viruses are slow in spreading,
 while worms are fast.
  Type
Malware
Malware
  Replication
Yes
Yes
  Protection
Antivirus software
Antimalware software
  Removal
Antivirus, formatting, system restore.
Antimalware, formatting, system restore.


Comments

Popular posts from this blog

Important Announcements(download all my book free)

O LEVEL- INTERNET TECHNOLOGY & WEB DESIGN

Call by Reference with Pointer in C Language part-4-a